期刊文献+

基于开集识别的恶意代码家族同源性分析 被引量:1

Analysis on the Homology of Malware Families Based on Open-set Recognition
下载PDF
导出
摘要 目前,恶意代码家族同源性分析方法多侧重于闭集分类问题的研究,即假定待测样本一定属于某个已知家族类别.然而真实环境中的恶意代码家族众多,未知类别的家族通常占大多数,采用闭集识别的方法,无法准确识别真实环境中的恶意代码家族.针对上述问题,提出了一种基于开集识别的恶意代码家族同源性分析方法.通过N-Gram滑动窗口和Doc2vec句嵌入方法将恶意代码可执行文件转换成灰度图像,基于卷积神经网络模型MobileNet获取灰度图像数据的特征,利用Open Long-tailed Recognition模型实现恶意代码家族的开集识别.在9个已知类别和9个未知类别恶意代码家族上进行识别,实验结果表明,所提出的方法能够识别出未知类别恶意代码家族,同时在已知类别和未知类别家族上都能保持较高的准确率. At present,analysis on the homology of malware families mostly focuses on the closed-set problem,that is,it is assumed that the samples to be tested must belong to a certain known class.However,there are many malware families in an open world,and the unknown classes usually account for the majority.The closed-set recognition cannot accurately identify the malware families in an open world.Aiming at the above problems,this paper proposes a homology analysis method for malware families based on open-set recognition.The malware executable files are converted into grayscale images through N-Gram sliding window and Doc2vec sentence embedding method,the features of the grayscale images are obtained based on the convolutional neural network model MobileNet,and the Open Long-tailed Recognition model is used to realize open-set recognition of malware families.Identifying 9 known classes and 9 unknown classes of malware families,the experimental results show that the proposed method can identify the malware family of the unknown classes while maintaining high accuracy on both known and unknown families.
作者 刘亚倩 Liu Yaqian(Beijing Topsec Network Security Technology Co.,Ltd.,Beijing 100085)
出处 《信息安全研究》 CSCD 2023年第8期762-770,共9页 Journal of Information Security Research
关键词 恶意代码家族 开集识别 Open Long-tailed Recognition N-GRAM Doc2vec MobileNet malware family open-set recognition Open Longtailed Recognition N-Gram Doc2vec MobileNet
  • 相关文献

参考文献7

二级参考文献33

  • 1董志强,肖新光,张栗伟.编码心理学分析病毒同源性[J].信息安全与通信保密,2005(8):55-59. 被引量:9
  • 2瑞星.2013年中国信息安全报告[EB/OL].[2014-03.12].http://www.rising.tom.cn/2013aogao/2013baogao.pdf.
  • 3Park, Younghee.Fast malware classification by automated behavioral graph matching[C]//Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research,2010.
  • 4Kinable J, Kostakis O.Malware classification based on call graph clustering[J].Journal in Computer Virology,2011,7 (4) :233-245.
  • 5Kolter J Z,Maloof M A.Learning to detect and classify malicious executables in the wild[J].The Journal of Machine Learning Research, 2006,7 : 2721-2744.
  • 6Hu X, Chiueh T, Shin K G.Large-scale malware indexing using function-call graphs[C]//Proceedings of the 16th ACM Conference on Computer and Communications Security, 2009 : 611-620.
  • 7Bayer U, Comparetti P M.Scalable, behavior-based malware clustering[C]//NDSS, 2009 : 8-11.
  • 8Flake H.Structural comparison of executable objects[C]// Proceedings of the IEEE Conference on Detection of Intrusions,Malware and Vulnerability Assessment(DIMVA), 2004.
  • 9Dullien T, Rolles R.Graph-based comparison of executable objects(English version) [C]//SSTIC,2005 : 1-3.
  • 10Mandiant.Tracking malware import hashing[EB/OL]. [2014-05-14].https ://www.mandiant.com/blog/tracking-mal- ware-import-hashing.

共引文献55

同被引文献6

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部